

Buy anything from 5,000+ international stores. One checkout price. No surprise fees. Join 2M+ shoppers on Desertcart.
Desertcart purchases this item on your behalf and handles shipping, customs, and support to UAE.
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software. From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code. Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game. Review: This book was a great sequel to the first Hacker Playbook - This book was a great sequel to the first Hacker Playbook. I've always enjoyed how the methods that are presented in this book stray away from simple penetration testing methodology into more targeted and smart hacking, with varying emphasis on how loud or silent to be in an engagement. Furthermore, the tools presented in this book as alternatives to the industry standard (e.x, Masscan as opposed to Nmap), are all tools I now include in my arsenal for engagements. Plus, instead of just looking at the same methods of attacking machines and different computing technologies, there are relevant vulnerabilities that are illustrated from an entire year of security research from various hackers (Heartbleed, Shellshock, etc.), making the skills you can acquire from this book relevant to the things you would normally see deployed in today's environment. Most noticeably, the practical approach to this book, the setup of a legitimate testing environment, and illustrated examples of techniques that are based off of real engagements make this book a must have for beginners and experts alike. All in all, 10 out of 10. I highly recommend purchasing this book if you are a penetration tester or looking to get into the security field. Review: "Blade" does it again... 5/5 - Security professional with 5-6 years of high level incident response and threat intel work here. These (THPB 1 and 2) are my go to books for pen testing / offsec. I like Kim's writing style and approach to covering the topics so I always pick up these books at some point. It's a nice and easy light read but has enough technical info and insight by the author to be useful to any information security professional from day onward. It's also worth noting that the author is actively engaged in the security community and working as a very successful penetration tester. Between that and updating the corresponding website ([...]) it's a good value. At the price of less than a pizza delivery and generally in the list of my top 10 security books/series, it's an easy choice to pick these up.
| Best Sellers Rank | #543,559 in Books ( See Top 100 in Books ) #147 in Software Testing #187 in Computer Hacking |
| Customer Reviews | 4.7 out of 5 stars 813 Reviews |
L**K
This book was a great sequel to the first Hacker Playbook
This book was a great sequel to the first Hacker Playbook. I've always enjoyed how the methods that are presented in this book stray away from simple penetration testing methodology into more targeted and smart hacking, with varying emphasis on how loud or silent to be in an engagement. Furthermore, the tools presented in this book as alternatives to the industry standard (e.x, Masscan as opposed to Nmap), are all tools I now include in my arsenal for engagements. Plus, instead of just looking at the same methods of attacking machines and different computing technologies, there are relevant vulnerabilities that are illustrated from an entire year of security research from various hackers (Heartbleed, Shellshock, etc.), making the skills you can acquire from this book relevant to the things you would normally see deployed in today's environment. Most noticeably, the practical approach to this book, the setup of a legitimate testing environment, and illustrated examples of techniques that are based off of real engagements make this book a must have for beginners and experts alike. All in all, 10 out of 10. I highly recommend purchasing this book if you are a penetration tester or looking to get into the security field.
G**F
"Blade" does it again... 5/5
Security professional with 5-6 years of high level incident response and threat intel work here. These (THPB 1 and 2) are my go to books for pen testing / offsec. I like Kim's writing style and approach to covering the topics so I always pick up these books at some point. It's a nice and easy light read but has enough technical info and insight by the author to be useful to any information security professional from day onward. It's also worth noting that the author is actively engaged in the security community and working as a very successful penetration tester. Between that and updating the corresponding website ([...]) it's a good value. At the price of less than a pizza delivery and generally in the list of my top 10 security books/series, it's an easy choice to pick these up.
E**O
Good book for practical approach
I gave to my son this book because he will study in the university informatics with option in cybersecurity. It has a good approach and simple explanations to use with Kali Linux and It got the interest of my son. I think that it has a good written with compact explanations for security IT terms and if you do a lab with equipments in a small LAN this will be a good book for everyone that feels passion for cybersecurity. Only a bad situation is the paper that it is similar to a copy in low resolution but I think this one is about the low price. The author has good approach for a young student.
J**O
Content is 5 stars, physical book is 4
I'm torn on how to rate this book. I've only had it for a day, but I think the content is awesome. There is a ton of information to learn from, and I especially like the info on how to set up pentest boxes. However, I'm very disappointed in the physical book itself. It looks like it was printed in someone's basement, on a low end laser printer that was running out of toner! Many of the section headers have lots of white running through the black text - not sure if that is intentionally done or not, but it's not a good look. I also have to say that the binding and gluing is poorly done - glue oozing out and making it hard to turn the pages. So, 5 stars for content, 1 star for the physical presentation of the book. Edit: After seeing my review, the author contacted me and offered to send me a new copy of the book. The new book arrived and is in much better physical condition. The gluing is much better - no glue oozing out, making it easy to actually turn the pages. The print is similar to my original copy, so I'm assuming that it's supposed to be that way. I'm not crazy about the font, but I can deal with it. Now, 5 stars for content, 4 stars for the physical presentation of the book.
S**A
This is, hands-down, one of the most useful technical assessment books I’ve purchased to date.
TL;DR: Excellent book for infosec practitioners, and a good read for application developers, system and network admins. The book tries to cover many of the tools which could be used during a technical assessment "pentest or vulnerability assessment"; what makes this book stand out from other similar books is that every single tool listed and explained in the book actually work and are relevant in modern environments, with excellent coverage of powershell as an offensive platform. The book explains how to achieve pentesting tasks in a very straight forward way, along with a brief part about setting up a test environment; It explains many of tools available in kali, passive discovery, creating password lists, scraping open source information, brief web application pentesting class, sqlmap and touches on more advanced topics, like evading AV and executing payloads remotely from memory, just to name few. This is, hands-down, one of the most useful technical assessment books I’ve purchased to date.
C**N
The book ROCKS i get like 5, and this one
The book ROCKS i get like 5 , and this one . Have good data. More than the CODES or tools this book give a way of thinking very interesting. You will never be the same after you red this. Is hard to belive this info is public just for some bucks. You can feel the autor in each line , he love github and use code , easy to start. He say this book is not for beginers but i belive this book is a godd book even if you are not interested in computers but you learn how easy the sistem can get down. This is one of the best books i ever get.... and i use many triks to make safe my sites like fraguas.com.ar
H**1
Tons of New Content / More Comprehensive version of THP1 with updates on Old/New Attacks!
I was surprised to see that a second volume of THP came out considering the vast amount of useful tips and tricks in the first book. To say the least, I was not dissapointed with the content that was in THP2. The author details exploitation methods of vulnerabilities not covered in THP1 such as Heartbleed, Shellshock, Kerberos attacks, in depth Powershell, to name a few. Additionally, the authors very own scripts and tools he's developed over the years are explained and shared with the reader--this was a huge bonus. I found this book to be a more comprehensive version of the first book with the author elaborating in greater detail the topics covered in the last book, while adding much more newer content on old/recent attack vectors out in the wild today. Definitely recommended for beginners and experts alike!
A**O
Essential Resource for your Info Sec Library
If someone asked you to design the perfect textbook for penetration testers with intelligent tutorials, screenshots, explanations, simulations, resources, and a comprehensive layout and design, you would get The Hacker Playbook 2 by Peter Kim. For those of us who are continually learning, researching and honing our skills, this is THE book for you. It's up to date, current, and applicable for study for penetration testers at any level. I highly recommend The Hacker Playbook 2 be an essential book in your Info Sec library.
A**E
Je recommande !
Les trois sont font parti celui là sont incroyables !
S**.
Perfect book
Delivery was before the date.. Book condition is good.. Go for it if you want to do pentration testing basics
K**I
Don't know?
I haven't readed yet, but I do know it's an old I.T book.
A**T
Handy book
A lot of detail, and depth. Still have this book 5 years later
P**D
Good Book, but Poor Print by Amazon
The book itself is a good informative read for the budding PenTester, and/or as a reference guide to dust away any cobwebs for out of touch PenTester. The let down for this is the purchase from Amazon - Their printout is of poor quality. The illustrations should be in colour but the book is entirely in black and white. Also note that some of the print (at least, my copy) is poor in places and is equivalent to the old dot-matrix print-out. In some area's the text is washed out and can be hard to read. I will be complaining to Amazon about this shortly.
Trustpilot
3 days ago
3 weeks ago